نتایج جستجو برای: construction operations

تعداد نتایج: 339250  

2006
Bartlomiej Stasiak Mykhaylo Yatsymirskyy

The paper presents a novel approach to the construction and learning of linear neural networks based on fast orthogonal transforms. The orthogonality of basic operations associated with the algorithm of a given transform is used in order to substantially reduce the number of adapted weights of the network. Two new types of neurons corresponding to orthogonal basic operations are introduced and ...

2016
TOM HARRIS

We use Grayson’s binary multicomplex presentation of algebraic K-theory to give a new construction of exterior power operations on the higher K-groups of a (quasi-compact) scheme. We show that these operations satisfy the axioms of a λ-ring, including the product and composition laws. To prove the composition law we show that the Grothendieck group of the exact category of integral polynomial f...

Journal: :J. Complexity 1988
Zvi Galil Raffaele Giancarlo

This paper surveys techniques for designing efficient sequential and parallel approximate string matching algorithms. Special attention is given to the methods for the construction of data structures that efficiently support primitive operations needed in approximate string matching.

2004
A. G. Khovanskii

The paper completes the construction of a multidimensional topological version of differential Galois theory. We construct a rich class of germs of functions of several variables which is closed under superpositions and other natural operations. The main theorem describes the behavior of the monodromy groups of such germs under the natural operations. As a result, we obtain topological obstruct...

2013
Russell Tarleton

A method of processing digital video signals produced by a sensor that are to be presented on a view?nder, the method involving: a ?rst pair of processing operations for scaling and color interpolation; and a second pair of processing opera tions for the formation of a color matrix and for White bal ancing. The operations of at least one, and preferably of both of the pairs of processing operat...

1997
Ivan A. Sag

Abstract This paper sketches a grammar of English relative clause constructions (including infinitival and reduced relatives) based on the notions of construction type and type constraints. Generalizations about dependency relations and clausal functions are factored into distinct dimensions contributing constraints to specific construction types in a multiple inheritance type hierarchy. The gr...

2014
Anthony D. Hawkins

effects of sound on Aquatic life Current expansion of offshore industrial activities has led to concern about the impact of man-made sounds upon marine animals (Southall et al., 2007; Hastings, 2008; Popper and Hawkins, 2012, 2014). Offshore oil and gas exploration and developments, wind farm construction and operations, other renewable energy sources, dredging, construction activities, naval s...

2009
Marco Ragni Thomas Fangmeier Andreas Bittner Lars Konieczny

In the following we present a cognitive model and a visual world experiment to test a fundamental hypothesis derived from the mental model approach: the assumption that special relational reasoning relies on a mental model manipulation device responsible for model construction, inspection and variation. We will provide evidence for a direct linking hypothesis of eye-movements, demonstrating tha...

2011
G. Ioannou Julio C. Martinez

Eight successively refined simulation models for the earthmoving operations involved in the construction of a dam provide the foundation for illustrating the ease and effectiveness of modeling complex construction processes by using STROBOSCOPE, a modern simulation system based on a programming language that follows the activity-scanning paradigm. This approach and the use of characterized reso...

2007
Ted Krovetz

This paper presents an efficient authenticated encryption construction based on a universal hash function and block cipher. Encryption is achieved via counter-mode while authentication uses the Wegman-Carter paradigm. A single block-cipher key is used for both operations. The construction is instantiated using the hash functions of UMAC and VMAC, resulting in authenticated encryption with peak ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید